1 - Introduction to the National Security Law as a Field

Sdílet
Vložit
  • čas přidán 27. 07. 2024
  • In this module, Professor Bobby Chesney of the University of Texas at Austin and Matt Waxman of Columbia Law, provide an introductory survey of the field.

Komentáře • 8

  • @diktoore
    @diktoore Před 16 dny

    Great lecture on framing national security law. Thank you very much for the insights.

  • @stevenhill8923
    @stevenhill8923 Před 3 lety +3

    Thanks for taking the time to put these together, Bobby and Matt. A real public service!

  • @tomster200
    @tomster200 Před 3 lety +1

    Thank you so much professors! Great resource and a public service as well. Much appreciated from this 1L

  • @corrycorina_lovelife2281
    @corrycorina_lovelife2281 Před 3 lety +1

    I just want to say thanks to Professor Chesney and Professor Waxman for the introduction of National Security. I picked the class for this fall quarter but then i freaked out when i see the syllabus. These lectures truly encouraged me and hopefully I can survive the class. Thanks!

    • @sarahnicole8262
      @sarahnicole8262 Před 3 lety +1

      Would love to hear your experience! Hope it went well

  • @prometheus3498
    @prometheus3498 Před 3 lety +2

    This is an incredibly interesting series, I only wish we were somehow able to communicate with these professors if we had further questions with regards to the lecture material. I'm looking forward to the future videos!

    • @RobertStraussCenter
      @RobertStraussCenter  Před 3 lety +1

      Please go to the website and send us an email with your questions. We will pass them along to the professors.

  • @cryptokidtv
    @cryptokidtv Před rokem

    U.S. defense contractor Lockheed Martin hopped onto the blockchain bandwagon recently. It partnered with Guardtime Federal to develop software solutions and engineering tools based on blockchain tech. The objective is to allow the Lockheed Martin team to store all weapon’s development data on a secure decentralized ledger so that foriegn governments and bad actors cannot access it.
    The tech is also being used to secure Unmanned Aerial Vehicles (UAVs) and other military devices deployed in the field across the world. This layer of protection helps the U.S. military gain a strategic advantage in the modern battlefield.